← Back to Home Standards Crosswalks Legitimacy & Evidence

Standards Crosswalk Annexes

This page converts the high-level crosswalk into framework-specific annexes. The goal is not exhaustive certification language. The goal is to show where Protective Computing can be translated into recognizable governance, privacy, security, and assurance controls with explicit evidence hooks.

How to read these annexes

The consolidated annexes remain below for side-by-side comparison, but each framework now also has its own citation target page.

Annex A: NIST Privacy Framework

Protective controlNIST PF function/categoryTranslationEvidence hook
Exposure MinimizationControl-P / Data minimization, manageabilityProtective Computing sharpens privacy-by-default into essential-only schema, bounded retention, and explicit egress review.field ledger, retention policy table
Local AuthorityControl-P / Individual participation, autonomyLocal authority operationalizes user agency by keeping the essential path available without continuous provider mediation.local authority profile, offline parity and sync spec
Coercion ResistanceGovern-P / Risk tolerance, harmful disclosure analysisThe framework lacks explicit coercion design language; Protective Computing adds forced-disclosure and compelled-export boundaries.coercion boundary matrix, scenario packet

Annex B: NIST AI RMF

Protective controlAI RMF functionTranslationEvidence hook
Threat boundariesMapProtective Computing can supply contextual harm boundaries for AI-assisted systems handling sensitive records or triage.specification, threat models
Repeatable auditsMeasureAudit checklists, evidence packets, and CI gates provide a repeatable measurement substrate for risky system behaviors.audit checklist, audit path
Operational governanceGovern / ManageProtective Computing adds release-bound evidence and explicit negative claims to reduce unsafe overstatement.reference packet, boundary page

Annex C: ISO/IEC 27001

Protective controlISO 27001 control familyTranslationEvidence hook
No master keys / operator non-possessionCryptography, access controlProtective Computing requires the operator boundary to be stated plainly instead of implied through general encryption claims.PainTracker mapping, reference packet
ReversibilityBusiness continuity, integrity, change recoveryReversibility adds user-facing undo, restore, and destructive-action boundedness to standard recoverability posture.reversibility boundary table
Degraded FunctionalityAvailability and continuityProtective Computing narrows availability to essential-path survival under constrained devices, bandwidth, and inputs.degraded mode matrix, requirements checklist

Annex D: ISO/IEC 42001

Protective controlISO 42001 concernTranslationEvidence hook
Boundary clarityAI system scope and intended useProtective Computing contributes a negative-claims discipline so deployers state what the system is not safe for.boundary page, reference packet
Human vulnerability controlsLifecycle risk treatmentThe discipline adds coercion, degraded infrastructure, and institutional pressure as governance-relevant failure conditions.threat models, independent review

Annex E: SOC 2 Trust Services Criteria

Protective controlTrust service criterionTranslationEvidence hook
Exposure MinimizationPrivacy / ConfidentialityProtective Computing makes confidentiality claims inspectable through per-field necessity and explicit retention windows.compliance matrix, retention enforcement report
Degraded FunctionalityAvailabilityAvailability is reframed as essential workflow continuity rather than mere uptime.offline parity, implementation spec
Essential UtilityProcessing integrity / GovernanceEssential utility questions whether incentive structures or optional features undermine reliable completion of the core task.feature justification matrix, subtraction report

Annex F: OWASP ASVS

Protective controlASVS areaTranslationEvidence hook
User-held keys / no backdoorsCryptography / data protectionProtective Computing adds an explicit prohibition on administrative decrypt capability as a public claim boundary.PainTracker mapping, duress checklist
Bounded egressCommunications / data protectionThe discipline requires intent-linked egress and threat-aware disclosure review instead of generic transport security alone.audit artifact draft, metadata retention policy
Coercion-safe limitationsArchitecture / threat modelingProtective Computing introduces a public requirement to document what the system cannot safely withstand under compulsion.coercion scenario packet, reference packet

Next hardening step

These annexes are evidence-linked but still intentionally compact. The next maturity step is framework-specific reviewer validation and per-control change tracking as mappings evolve.